RLSA-2024:8729

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:8729.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:8729
Related
Published
2024-11-08T15:56:47.559546Z
Modified
2024-11-08T15:59:26.638925Z
Summary
Moderate: firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

  • firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)

  • firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)

  • firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)

  • firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)

  • firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)

  • firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)

  • firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)

  • firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)

  • firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)

  • firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / firefox

Package

Name
firefox
Purl
pkg:rpm/rocky-linux/firefox?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:128.4.0-1.el8_10